Entry Requirements
Entry Requirement : None
Length of worskhop: 2 days
Duration: 0 Months
Delivery Method: Both Online & Physical
Fee Structure
Full Course Fees | |
---|---|
Registration Fee | KES 30,000.00 ($ 300.00) |
Certification Fee | KES 0.00 ($ 0.00) |
Administration Fee | KES 0.00 ($ 0.00) |
Internal Exam Fee | KES 0.00 ($ 0.00) |
External Exam Fee | KES 0.00 ($ 0.00) |
Examining Body Membership Fee * | KES 0.00 ($ 0.00) |
Tuition Fee | KES 0.00 ($ 0.00) |
Fees Totals | KES 30,000.00 ($ 300.00) |
* Examining Body Membership Fee may be payable through us or directly to the Examining Body |
Course Requirements
Daily fee is Kes15,000 per person including lunch and refreshments (venue is a hotel)
The other option is Kes10,000 per person including lunch and refreshments (venue = our offices)
Practical Requirements (where applicable)
Course Units/Overview
Day |
Time |
Theme/Topic |
Sub-Topic/Lesson |
Skill/Competency |
Day 1 |
9:00 AM - 9:30 AM |
Introduction to Cybersecurity Risk Management |
Overview of cybersecurity threats and risk management principles |
Understand the landscape of cybersecurity threats |
Day 1 |
9:30 AM - 10:30 AM |
Types of Cyber Threats and Attack Vectors |
Types of threats such as malware, phishing, ransomware, and advanced persistent threats |
Ability to identify common types of cyber threats and methods used by attackers |
Day 1 |
10:30 AM - 11:00 AM |
Health Break |
|
|
Day 1 |
11:00 AM - 12:00 PM |
Risk Assessment in Cybersecurity |
Techniques and methodologies for assessing cybersecurity risk |
Skills to conduct basic risk assessments for IT systems |
Day 1 |
12:00 PM - 1:00 PM |
Vulnerability Analysis and Management |
Identifying and managing system vulnerabilities using tools and best practices. |
Knowledge of vulnerability scanning tools and techniques |
Day 1 |
1:00 PM - 2:00 PM |
Lunch Break |
|
|
Day 1 |
2:00 PM - 3:00 PM |
Understanding Insider Threats |
Role of internal threats and social engineering tactics |
Awareness of insider threat indicators and mitigation methods |
Day 1 |
3:00 PM - 4:00 PM |
Cybersecurity Risk Management Tools and Frameworks |
Overview of tools like NIST, ISO 27001, and CIS Controls |
Familiarity with key cybersecurity risk management frameworks |
Day 1 |
4:00 PM - 4:30 PM |
Q&A/Recap |
Open forum for questions and review |
|
Day 2 |
9:00 AM - 9:30 AM |
Developing a Cybersecurity Incident Response Plan |
Elements of an effective incident response plan and its implementation |
Ability to draft a basic incident response plan |
Day 2 |
9:30 AM - 10:30 AM |
Data Protection and Encryption Techniques |
Methods for protecting sensitive data, including encryption and data masking |
Knowledge of data protection and encryption strategies |
Day 2 |
10:30 AM - 11:00 AM |
Health Break |
|
|
Day 2 |
11:00 AM - 12:00 PM |
Backup and Recovery Planning |
Developing data backup strategies and disaster recovery plans |
Knowledge of effective backup and recovery methods |
Day 2 |
12:00 PM - 1:00 PM |
Endpoint Security and Access Control |
Understanding endpoint security measures, including multi-factor authentication (MFA) and access control |
Ability to implement access control measures for improved security |
Day 2 |
1:00 PM - 2:00 PM |
Lunch Break |
|
|
Day 2 |
2:00 PM - 3:00 PM |
Implementing Network Security Controls |
Overview of firewalls, intrusion detection/prevention systems, and other network security controls |
Skills to select and configure network security controls |
Day 2 |
3:00 PM - 4:00 PM |
Monitoring and Responding to Cyber Threats in Real-Time |
Tools and techniques for proactive threat monitoring and response |
Ability to use monitoring tools for real-time cybersecurity response |
Day 2 |
4:00 PM - 4:30 PM |
Q&A/Workshop Close |
Final questions and workshop summary |
|
Course Description
CYBERSECURITY RISK MANAGEMENT WORKSHOP
Course Description;
The Cybersecurity Risk Management Workshop is an intensive, two-day program designed to equip participants with the essential skills and knowledge needed to identify, assess, and mitigate cybersecurity risks in today’s digital landscape. This course provides a comprehensive overview of cyber threats, vulnerabilities, and emerging risks, along with practical strategies for managing and responding to these challenges effectively. Through a blend of theoretical lessons and hands-on exercises, participants will learn to conduct risk assessments, develop incident response plans, implement security controls, and ensure regulatory compliance. By the end of the workshop, attendees will have a foundational understanding of cybersecurity risk management principles and the practical ability to enhance organizational security posture.
Career Opportunities;
- IT and Network Administrators
- Cybersecurity Analyst
- Risk Management Professionals
- Compliance Officers
- Data Protection Officers (DPOs)
- Security Consultants and Auditors
- Business Managers and Executives
- Legal Professionals in Cyber Law
- Project Managers in IT and Security
Course Objectives
- Identify and assess various types of cybersecurity threats and vulnerabilities
- Conduct thorough cybersecurity risk assessments using established frameworks
- Develop and implement effective incident response plans for cyber incidents
- Apply data protection strategies, including encryption and access control, to safeguard information
- Utilize cybersecurity tools for real-time monitoring and proactive threat mitigation
What we offer
Finstock evarsity college offers a wide range of courses that are geared towards job creation as well as employment. Our courses and product offerings are categorized as online college based, degree programs, freemium courses and premium resources!
Both freemium and premium online courses come with certificates of completion and you can register instantly and begin studying at your convenience.
Enroll and study in one of the best online schools in the world. Listen to the advice of the best. Participate in training sessions with industry experts to learn more about your career options. Take classes with students from all over the world. Join us at Finstock Evarsity college for the best learning experience.
Course Instructor(s)
TBA
Examining Body
FINSTOCK EVARSITY COLLEGE
FAQs
Course Reviews
Top Rated Reviews
No course reviews are available at the moment. Reviews are only submitted by students persuing the course. Reviews are subject to our terms and conditions.